
Answer-first summary for fast verification
Answer: Assign built-in Azure Policy initiatives to the organization's resource groups to enforce compliance with NISPOM security controls, including but not limited to access control and audit logging.
Option B is the most effective solution because it utilizes built-in Azure Policy initiatives, which are pre-configured to enforce a wide range of compliance and security controls, including those specified by NISPOM. This approach ensures comprehensive coverage of necessary security controls, such as access control and audit logging, without the need for extensive custom policy development. While options A, C, and D address specific aspects of NISPOM compliance, they do not offer the broad and immediate compliance assurance provided by built-in initiatives.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
As a Microsoft Cybersecurity Architect, you are tasked with designing a solution for a government organization that processes classified data and must comply with the National Industrial Security Program Operating Manual (NISPOM). The solution must enforce security controls in the Azure environment to ensure compliance. Given the constraints of cost, compliance, and scalability, which of the following approaches would BEST utilize Azure Policy to meet these requirements? (Choose one option.)
A
Implement custom Azure Policy definitions to enforce data classification and labeling for classified data, ensuring sensitive data is identified and protected according to NISPOM requirements.
B
Assign built-in Azure Policy initiatives to the organization's resource groups to enforce compliance with NISPOM security controls, including but not limited to access control and audit logging.
C
Configure Azure Policy to mandate the use of Azure Key Vault for all cryptographic keys used in encrypting classified data, ensuring key management complies with NISPOM.
D
Leverage Azure Policy in conjunction with Azure Security Center to continuously monitor and remediate security vulnerabilities associated with classified data processing.
No comments yet.